SlideShare a Scribd company logo
1 of 20
When do you decide to
go to The Cloud?
SharePoint Saturday UK – November 2013 – Mark Stokes
Mark Stokes


Red Plane


Microsoft Partner in North West UK



www.redplane.co.uk



@FlyRedPlane



Office 365, SharePoint, Azure, nopCommerce, Windows 8 Apps, Windows Phone
Apps, iOS Apps, .Net



mark.stokes@redplane.co.uk



@MarkStokes



Interests: SharePoint, Technology, Photography, Raspberry Pi, Snowboarding,
Wakeboaring, Running, Tough Mudder (maybe!), My Dog - Hugo
Agenda


What does the Cloud mean to us?



What the marketing tells you



What the marketing doesn’t tell you



Trust – Security & Privacy



Control



Cost / Benefits



Some other things to think about



Job Security – The end of the IT Pro?
What does The Cloud mean to us?


Types of cloud



Cloud Offerings





SaaS



Private Cloud



PaaS



Community Cloud



IaaS





On-Premises

Public Cloud



DaaS

Characteristics (NIST)


On-demand self-service



Broad network access



Resource pooling



Rapid elasticity



Measured service
What the marketing tells you


No upfront “infrastructure” costs



Simple per user per month licencing cost



It’s always there (99.9% uptime – Financially backed!)



Access Anywhere, Anytime on Any Device



You will save money



It’s quick, easy and idiot proof



There is no downside



It’s the future



We are “all in”



It what you should be doing…..
What the marketing doesn't tell you


Upfront Costs


Awareness, education and training on new systems



You still need to “design” your cloud environment



You still need to migrate your content into The Cloud



You might need to invest in faster / more robust Internet connectivity



De-provisioning costs of existing infrastructure



Supporting Architecture – DirSync / ADFS – Single Sign-On



Vendor Lock-in



Lack of control of the platform



You will (should) save money if you do it right and have a medium to long term
strategy



How good is your MS Partner at setting up and configuring the services?
Service Continuity


Redundancy



Monitoring





Internal monitoring built to drive automatic
recovery



Data redundancy with robust failover capabilities



Outside-in monitoring raises alerts about incidents





Physical redundancy at server, datacenter, and
service levels

Functional redundancy with offline functionality



Extensive diagnostics provide logging, auditing, and
granular tracing

Resiliency





Automated failover with human backup





Active load balancing

Recovery testing across failure domains



Distributed component services like Exchange
Online, SharePoint Online, and Lync Online limit
scope and impact of any failures in a component



Directory data replicated across component
services insulates one service from another in any
failure events



Fully automated deployment models, making
deployment easier than ever





Standardized hardware reduces issue isolation
complexities



Distributed services


Simplification

Standard built-in management mechanism

Human backup


Automated recovery actions with 24/7 on-call
support



Team with diverse skills on the call provides rapid
response and resolution



Continuous improvement by learning from the oncall teams

Simplified operations and deployment
Service Continuity


Continuous learning




Our post-incident review consists of analysis of
what happened, our response, and our plan to
prevent it in the future





If an incident occurs, regardless of the
magnitude of impact we do a thorough postincident review every time

In the event your organization was affected by
a service incident, we share the post-incident
review with you

Consistent communication


Transparency requires consistent
communication, especially when you are using
the service



We have a number of communication channels
such as email, RSS feeds, and the very
important and highly relevant Service Health
Dashboard



Consistent communication
Trust - Security


Is your Cloud Provider Secure?



Do you “Trust” your cloud provider with your data?



What accreditations does you Cloud provider have (e.g. IL2 / IL3)



Are there any recorded security breaches?



What level of security to you actually need?



Could YOU do a better job of securing your own data?


Security of Data at Rest



Security of Data in Transit
Trust - Privacy / Data Protection


Where is your data?





The laws of the land in the location where your data is stored
Check the small print of your Service Providers Terms and Conditions

Who owns your data?


And what can they do with it?



PRISM



Safe Harbor



Additional questions are:


Just how private is your data REALLY?



Are hackers REALLY going to be interested in YOUR data?



If yes, then can your Cloud provider provide “at least the same” level of privacy control that
you could do yourself?
PRISM


Clandestine mass electronic surveillance data mining program



Operated by the US National Security Agency (NSA) since 2007



Collects stored Internet Communications based on demands made to Internet companies such
as Google, Microsoft, Yahoo!, Facebook, PalTalk, YouTube, Skype, AOL, Apple



Provides – E-mail, Chat (Video & Voice), Videos, Photos, Stored data, VoIP, File
Transfers, Video Conferencing, Notifications of target activity (logins, etc), Online Social
Networking details, Special Requests



US as a World’s Telecommunications Backbone


Much of the worlds communications flow through the US



A target’s phone call, e-mail or chat will take the cheapest path, not the physically most
direct path – you can’t always predict the path.



A target’s communications could easily be flowing into and through the U.S.
US-EU Safe Harbor


Streamlined process for US companies to comply with EU Directive on the
protection of personal data



Companies operating in the EU are not allowed to send personal data to
countries outside of the European Economic Area unless there is a guarantee
that it will receive adequate levels of protection



Intended for organisations within the EU or US that stores customer data, the
Safe Harbor Principles are designed to prevent accidental information
disclosure or loss.



US companies can opt into the program as long as they adhere to the 7
principles outlined in the directive.
US-EU Safe Harbor Principles


Notice – Individuals must be informed that their data is being collected and
how it will be used



Choice – individuals must have the ability to opt out of the collection and
forward transfer of the data to third parties



Onward Transfer – Transfers of data to third parties may only occur to other
organisations that follow adequate data protection principles



Security – Reasonable efforts must be made to prevent loss of collected data



Data integrity – Data must be relevant and reliable for the purpose it was
collected for



Access – Individuals must be able to access information held about them, and
correct or delete it if it is inaccurate



Enforcement – There must be effective means of enforcing these rules
Control - Or rather the lack of


You no longer control the platform



You no longer have control over platform updates



What warning / communication do you have of impending updates?




How do you test your configuration / customisations against impending updates?

What support capability is offered? /what are the SLAs?
Cost benefits


Compare on-premises to cloud for certain scenarios


Focus on running your company rather than being an IT company that makes some
widgets



Short, medium or long term investment?



Capital Expenditure to Operational Expenditure
CapEx vs OpEx
CAPEX

OPEX

Definition:

OPEX refers to expenses incurred in the course
Capital expenditures are expenditures creating future benefits. A
of ordinary business, such as sales, general
capital expenditure is incurred when a business spends money either
and administrative expenses (and excluding cost
to buy fixed assets or to add to the value of an existing asset with a
of goods sold – or COGS, taxes, depreciation and
useful life that extends beyond the tax year.
interest).

Also known as:

Capital Expense

Accounting treatment:

Cannot be fully deducted in the period when they were incurred.
Operating expenses are fully deducted in the
Tangible assets are depreciated and intangible assets are amortized accounting period during which they were
over time.
incurred.

In throughput accounting:

Money spent on inventory falls under CAPEX.

The money spent turning inventory into
throughput is OPEX.

In real estate term:

Costs incurred for buying the income producing property.

Costs associated with the operation and
maintenance of an income producing property.

Examples:

Buying machinery and other equipment, acquiring intellectual
property assets like patents, furniture and fixtures

Wages, maintenance and repair of machinery,
utilities, rent, SG&A expenses, license fees,
office running expenses

Operating Expenditure, Revenue Expenditure

http://www.office365-singapore.com/microsoft-office-365/office-365-opex-cost-savings/
Things to think about


Content Migration



Connectivity





Internet Connectivity
Cloud connectivity to on-premises LOB applications

Features




Do you need features your chosen cloud doesn't have / support?

Customisations


Developing



Deploying



Maintenance / Support - Third Party Support Contracts (changes to the platform
might break your code)
Job Security – The end of the IT Pro?
Thanks to our
Sponsors
Thank you…

More Related Content

What's hot

Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesSeccuris Inc.
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from SymantecArrow ECS UK
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - WebFahd Khan
 
Cloud Audit and Compliance
Cloud Audit and ComplianceCloud Audit and Compliance
Cloud Audit and ComplianceQuadrisk
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItMarc Crudgington, MBA
 
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la informaciónBe Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la informaciónSymantec LATAM
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak preventionAriel Evans
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Symantec APJ
 
10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the CloudPeak 10
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...IBM Security
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?IBM Security
 
Webinar: Be Cyber Smart – Stories from the Trenches
Webinar: Be Cyber Smart – Stories from the TrenchesWebinar: Be Cyber Smart – Stories from the Trenches
Webinar: Be Cyber Smart – Stories from the TrenchesWithum
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataOnline Business
 
Digital Rights Management One For Sharepoint
Digital Rights Management One For SharepointDigital Rights Management One For Sharepoint
Digital Rights Management One For Sharepointpabatan
 
Preventing Data Breaches
Preventing Data BreachesPreventing Data Breaches
Preventing Data Breachesxband
 

What's hot (20)

Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - Web
 
Cloud Audit and Compliance
Cloud Audit and ComplianceCloud Audit and Compliance
Cloud Audit and Compliance
 
SEC440: Incident Response Plan
SEC440: Incident Response PlanSEC440: Incident Response Plan
SEC440: Incident Response Plan
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify It
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
 
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la informaciónBe Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak prevention
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
 
10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?
 
Webinar: Be Cyber Smart – Stories from the Trenches
Webinar: Be Cyber Smart – Stories from the TrenchesWebinar: Be Cyber Smart – Stories from the Trenches
Webinar: Be Cyber Smart – Stories from the Trenches
 
Webinar: Microsoft 365 - Your Gateway to Data Loss Prevention
Webinar: Microsoft 365 - Your Gateway to Data Loss PreventionWebinar: Microsoft 365 - Your Gateway to Data Loss Prevention
Webinar: Microsoft 365 - Your Gateway to Data Loss Prevention
 
DLP
DLPDLP
DLP
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
Digital Rights Management One For Sharepoint
Digital Rights Management One For SharepointDigital Rights Management One For Sharepoint
Digital Rights Management One For Sharepoint
 
Preventing Data Breaches
Preventing Data BreachesPreventing Data Breaches
Preventing Data Breaches
 

Viewers also liked

Instrumen penjaringan data sma muhammadiyah pakenjeng
Instrumen penjaringan data sma muhammadiyah pakenjengInstrumen penjaringan data sma muhammadiyah pakenjeng
Instrumen penjaringan data sma muhammadiyah pakenjengRobbi Robbi
 
SUGUK NW - 130430 - SharePoint Social
SUGUK NW - 130430 - SharePoint SocialSUGUK NW - 130430 - SharePoint Social
SUGUK NW - 130430 - SharePoint SocialMark Stokes
 
SUGUK - News - 2013-12
SUGUK - News - 2013-12SUGUK - News - 2013-12
SUGUK - News - 2013-12Mark Stokes
 
Evo conf - SharePoint for the first time
Evo conf - SharePoint for the first timeEvo conf - SharePoint for the first time
Evo conf - SharePoint for the first timeMark Stokes
 
Christmas traditions in lithuania 2012-2013
Christmas traditions in lithuania  2012-2013Christmas traditions in lithuania  2012-2013
Christmas traditions in lithuania 2012-2013Elena Kulbokienė
 
Provision of non audit services in sudan. (asbbs 14th conference in paris)
Provision of non audit services in sudan. (asbbs 14th conference in paris)Provision of non audit services in sudan. (asbbs 14th conference in paris)
Provision of non audit services in sudan. (asbbs 14th conference in paris)Amna Obeid
 
mardu masin araspelner
mardu masin araspelnermardu masin araspelner
mardu masin araspelnernanor2003
 
Black and White - by www.aramanstudio.com
Black and White - by www.aramanstudio.comBlack and White - by www.aramanstudio.com
Black and White - by www.aramanstudio.comaraman
 
Lorenzini.belli
Lorenzini.belliLorenzini.belli
Lorenzini.belliimartini
 

Viewers also liked (15)

Instrumen penjaringan data sma muhammadiyah pakenjeng
Instrumen penjaringan data sma muhammadiyah pakenjengInstrumen penjaringan data sma muhammadiyah pakenjeng
Instrumen penjaringan data sma muhammadiyah pakenjeng
 
SUGUK NW - 130430 - SharePoint Social
SUGUK NW - 130430 - SharePoint SocialSUGUK NW - 130430 - SharePoint Social
SUGUK NW - 130430 - SharePoint Social
 
Cb renewables
Cb renewablesCb renewables
Cb renewables
 
Link building-secrets
Link building-secretsLink building-secrets
Link building-secrets
 
SUGUK - News - 2013-12
SUGUK - News - 2013-12SUGUK - News - 2013-12
SUGUK - News - 2013-12
 
Evo conf - SharePoint for the first time
Evo conf - SharePoint for the first timeEvo conf - SharePoint for the first time
Evo conf - SharePoint for the first time
 
Nokia
NokiaNokia
Nokia
 
NOAAsept2004
NOAAsept2004NOAAsept2004
NOAAsept2004
 
E1mybusyday
E1mybusydayE1mybusyday
E1mybusyday
 
Christmas traditions in lithuania 2012-2013
Christmas traditions in lithuania  2012-2013Christmas traditions in lithuania  2012-2013
Christmas traditions in lithuania 2012-2013
 
Provision of non audit services in sudan. (asbbs 14th conference in paris)
Provision of non audit services in sudan. (asbbs 14th conference in paris)Provision of non audit services in sudan. (asbbs 14th conference in paris)
Provision of non audit services in sudan. (asbbs 14th conference in paris)
 
Amazon EC2
Amazon EC2Amazon EC2
Amazon EC2
 
mardu masin araspelner
mardu masin araspelnermardu masin araspelner
mardu masin araspelner
 
Black and White - by www.aramanstudio.com
Black and White - by www.aramanstudio.comBlack and White - by www.aramanstudio.com
Black and White - by www.aramanstudio.com
 
Lorenzini.belli
Lorenzini.belliLorenzini.belli
Lorenzini.belli
 

Similar to SPSUK - When do you decide to go to the cloud?

Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloudtcarrucan
 
Michael Josephs
Michael JosephsMichael Josephs
Michael JosephsdaveGBE
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityRobert Kleinschmidt
 
PTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIAPTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIAGeorge Delikouras
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Robert Crane
 
f6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdff6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdfSurendhar57
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRMatt Stubbs
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.pptssusera76ea9
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxsarah david
 
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]Tudor Damian
 
Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3Dawn Simpson
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceAdrian Dumitrescu
 
Lab Datareach Presentation V5
Lab Datareach Presentation V5Lab Datareach Presentation V5
Lab Datareach Presentation V5damonhough
 
HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016SteveAtHPE
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentationJMS Secure Data
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyStorage Switzerland
 
IEEE PHM Cloud Computing
IEEE PHM Cloud ComputingIEEE PHM Cloud Computing
IEEE PHM Cloud ComputingJoseph Williams
 

Similar to SPSUK - When do you decide to go to the cloud? (20)

Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
 
Michael Josephs
Michael JosephsMichael Josephs
Michael Josephs
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
 
ISS CAPSTONE TEAM
ISS CAPSTONE TEAMISS CAPSTONE TEAM
ISS CAPSTONE TEAM
 
PTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIAPTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIA
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
 
f6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdff6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdf
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
Effective data protection for businesses with multiple locations
Effective data protection for businesses with multiple locationsEffective data protection for businesses with multiple locations
Effective data protection for businesses with multiple locations
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.ppt
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
 
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
 
Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
Lab Datareach Presentation V5
Lab Datareach Presentation V5Lab Datareach Presentation V5
Lab Datareach Presentation V5
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 
HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
 
IEEE PHM Cloud Computing
IEEE PHM Cloud ComputingIEEE PHM Cloud Computing
IEEE PHM Cloud Computing
 

More from Mark Stokes

SUGUK - Manchester - Ignite 2017 update
SUGUK - Manchester - Ignite 2017 updateSUGUK - Manchester - Ignite 2017 update
SUGUK - Manchester - Ignite 2017 updateMark Stokes
 
Using SharePoint's Geolocation Field - SPSUK 2014
Using SharePoint's Geolocation Field - SPSUK 2014Using SharePoint's Geolocation Field - SPSUK 2014
Using SharePoint's Geolocation Field - SPSUK 2014Mark Stokes
 
AvePoint Cloud Series - When do you decide to go to Office 365?
AvePoint Cloud Series - When do you decide to go to Office 365?AvePoint Cloud Series - When do you decide to go to Office 365?
AvePoint Cloud Series - When do you decide to go to Office 365?Mark Stokes
 
SUG - Singapore - Use of Social communication in the next generation of business
SUG - Singapore - Use of Social communication in the next generation of businessSUG - Singapore - Use of Social communication in the next generation of business
SUG - Singapore - Use of Social communication in the next generation of businessMark Stokes
 
Evo conf - Designing SharePoint Solutions
Evo conf  - Designing SharePoint SolutionsEvo conf  - Designing SharePoint Solutions
Evo conf - Designing SharePoint SolutionsMark Stokes
 
Sharepoint User Group Geneva - Introduction to Office 365
Sharepoint User Group Geneva - Introduction to Office 365Sharepoint User Group Geneva - Introduction to Office 365
Sharepoint User Group Geneva - Introduction to Office 365Mark Stokes
 
SPEvo13 - COM701 - The full story of a large scale SharePoint upgrade
SPEvo13 - COM701 - The full story of a large scale SharePoint upgradeSPEvo13 - COM701 - The full story of a large scale SharePoint upgrade
SPEvo13 - COM701 - The full story of a large scale SharePoint upgradeMark Stokes
 
SharePoint 2013 Search - Whats new for End Users
SharePoint 2013 Search - Whats new for End UsersSharePoint 2013 Search - Whats new for End Users
SharePoint 2013 Search - Whats new for End UsersMark Stokes
 

More from Mark Stokes (8)

SUGUK - Manchester - Ignite 2017 update
SUGUK - Manchester - Ignite 2017 updateSUGUK - Manchester - Ignite 2017 update
SUGUK - Manchester - Ignite 2017 update
 
Using SharePoint's Geolocation Field - SPSUK 2014
Using SharePoint's Geolocation Field - SPSUK 2014Using SharePoint's Geolocation Field - SPSUK 2014
Using SharePoint's Geolocation Field - SPSUK 2014
 
AvePoint Cloud Series - When do you decide to go to Office 365?
AvePoint Cloud Series - When do you decide to go to Office 365?AvePoint Cloud Series - When do you decide to go to Office 365?
AvePoint Cloud Series - When do you decide to go to Office 365?
 
SUG - Singapore - Use of Social communication in the next generation of business
SUG - Singapore - Use of Social communication in the next generation of businessSUG - Singapore - Use of Social communication in the next generation of business
SUG - Singapore - Use of Social communication in the next generation of business
 
Evo conf - Designing SharePoint Solutions
Evo conf  - Designing SharePoint SolutionsEvo conf  - Designing SharePoint Solutions
Evo conf - Designing SharePoint Solutions
 
Sharepoint User Group Geneva - Introduction to Office 365
Sharepoint User Group Geneva - Introduction to Office 365Sharepoint User Group Geneva - Introduction to Office 365
Sharepoint User Group Geneva - Introduction to Office 365
 
SPEvo13 - COM701 - The full story of a large scale SharePoint upgrade
SPEvo13 - COM701 - The full story of a large scale SharePoint upgradeSPEvo13 - COM701 - The full story of a large scale SharePoint upgrade
SPEvo13 - COM701 - The full story of a large scale SharePoint upgrade
 
SharePoint 2013 Search - Whats new for End Users
SharePoint 2013 Search - Whats new for End UsersSharePoint 2013 Search - Whats new for End Users
SharePoint 2013 Search - Whats new for End Users
 

Recently uploaded

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Recently uploaded (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

SPSUK - When do you decide to go to the cloud?

  • 1. When do you decide to go to The Cloud? SharePoint Saturday UK – November 2013 – Mark Stokes
  • 2. Mark Stokes  Red Plane  Microsoft Partner in North West UK  www.redplane.co.uk  @FlyRedPlane  Office 365, SharePoint, Azure, nopCommerce, Windows 8 Apps, Windows Phone Apps, iOS Apps, .Net  mark.stokes@redplane.co.uk  @MarkStokes  Interests: SharePoint, Technology, Photography, Raspberry Pi, Snowboarding, Wakeboaring, Running, Tough Mudder (maybe!), My Dog - Hugo
  • 3. Agenda  What does the Cloud mean to us?  What the marketing tells you  What the marketing doesn’t tell you  Trust – Security & Privacy  Control  Cost / Benefits  Some other things to think about  Job Security – The end of the IT Pro?
  • 4. What does The Cloud mean to us?  Types of cloud  Cloud Offerings   SaaS  Private Cloud  PaaS  Community Cloud  IaaS   On-Premises Public Cloud  DaaS Characteristics (NIST)  On-demand self-service  Broad network access  Resource pooling  Rapid elasticity  Measured service
  • 5. What the marketing tells you  No upfront “infrastructure” costs  Simple per user per month licencing cost  It’s always there (99.9% uptime – Financially backed!)  Access Anywhere, Anytime on Any Device  You will save money  It’s quick, easy and idiot proof  There is no downside  It’s the future  We are “all in”  It what you should be doing…..
  • 6. What the marketing doesn't tell you  Upfront Costs  Awareness, education and training on new systems  You still need to “design” your cloud environment  You still need to migrate your content into The Cloud  You might need to invest in faster / more robust Internet connectivity  De-provisioning costs of existing infrastructure  Supporting Architecture – DirSync / ADFS – Single Sign-On  Vendor Lock-in  Lack of control of the platform  You will (should) save money if you do it right and have a medium to long term strategy  How good is your MS Partner at setting up and configuring the services?
  • 7. Service Continuity  Redundancy  Monitoring   Internal monitoring built to drive automatic recovery  Data redundancy with robust failover capabilities  Outside-in monitoring raises alerts about incidents   Physical redundancy at server, datacenter, and service levels Functional redundancy with offline functionality  Extensive diagnostics provide logging, auditing, and granular tracing Resiliency    Automated failover with human backup   Active load balancing Recovery testing across failure domains  Distributed component services like Exchange Online, SharePoint Online, and Lync Online limit scope and impact of any failures in a component  Directory data replicated across component services insulates one service from another in any failure events  Fully automated deployment models, making deployment easier than ever   Standardized hardware reduces issue isolation complexities  Distributed services  Simplification Standard built-in management mechanism Human backup  Automated recovery actions with 24/7 on-call support  Team with diverse skills on the call provides rapid response and resolution  Continuous improvement by learning from the oncall teams Simplified operations and deployment
  • 8. Service Continuity  Continuous learning   Our post-incident review consists of analysis of what happened, our response, and our plan to prevent it in the future   If an incident occurs, regardless of the magnitude of impact we do a thorough postincident review every time In the event your organization was affected by a service incident, we share the post-incident review with you Consistent communication  Transparency requires consistent communication, especially when you are using the service  We have a number of communication channels such as email, RSS feeds, and the very important and highly relevant Service Health Dashboard  Consistent communication
  • 9. Trust - Security  Is your Cloud Provider Secure?  Do you “Trust” your cloud provider with your data?  What accreditations does you Cloud provider have (e.g. IL2 / IL3)  Are there any recorded security breaches?  What level of security to you actually need?  Could YOU do a better job of securing your own data?  Security of Data at Rest  Security of Data in Transit
  • 10. Trust - Privacy / Data Protection  Where is your data?    The laws of the land in the location where your data is stored Check the small print of your Service Providers Terms and Conditions Who owns your data?  And what can they do with it?  PRISM  Safe Harbor  Additional questions are:  Just how private is your data REALLY?  Are hackers REALLY going to be interested in YOUR data?  If yes, then can your Cloud provider provide “at least the same” level of privacy control that you could do yourself?
  • 11. PRISM  Clandestine mass electronic surveillance data mining program  Operated by the US National Security Agency (NSA) since 2007  Collects stored Internet Communications based on demands made to Internet companies such as Google, Microsoft, Yahoo!, Facebook, PalTalk, YouTube, Skype, AOL, Apple  Provides – E-mail, Chat (Video & Voice), Videos, Photos, Stored data, VoIP, File Transfers, Video Conferencing, Notifications of target activity (logins, etc), Online Social Networking details, Special Requests  US as a World’s Telecommunications Backbone  Much of the worlds communications flow through the US  A target’s phone call, e-mail or chat will take the cheapest path, not the physically most direct path – you can’t always predict the path.  A target’s communications could easily be flowing into and through the U.S.
  • 12. US-EU Safe Harbor  Streamlined process for US companies to comply with EU Directive on the protection of personal data  Companies operating in the EU are not allowed to send personal data to countries outside of the European Economic Area unless there is a guarantee that it will receive adequate levels of protection  Intended for organisations within the EU or US that stores customer data, the Safe Harbor Principles are designed to prevent accidental information disclosure or loss.  US companies can opt into the program as long as they adhere to the 7 principles outlined in the directive.
  • 13. US-EU Safe Harbor Principles  Notice – Individuals must be informed that their data is being collected and how it will be used  Choice – individuals must have the ability to opt out of the collection and forward transfer of the data to third parties  Onward Transfer – Transfers of data to third parties may only occur to other organisations that follow adequate data protection principles  Security – Reasonable efforts must be made to prevent loss of collected data  Data integrity – Data must be relevant and reliable for the purpose it was collected for  Access – Individuals must be able to access information held about them, and correct or delete it if it is inaccurate  Enforcement – There must be effective means of enforcing these rules
  • 14. Control - Or rather the lack of  You no longer control the platform  You no longer have control over platform updates  What warning / communication do you have of impending updates?   How do you test your configuration / customisations against impending updates? What support capability is offered? /what are the SLAs?
  • 15. Cost benefits  Compare on-premises to cloud for certain scenarios  Focus on running your company rather than being an IT company that makes some widgets  Short, medium or long term investment?  Capital Expenditure to Operational Expenditure
  • 16. CapEx vs OpEx CAPEX OPEX Definition: OPEX refers to expenses incurred in the course Capital expenditures are expenditures creating future benefits. A of ordinary business, such as sales, general capital expenditure is incurred when a business spends money either and administrative expenses (and excluding cost to buy fixed assets or to add to the value of an existing asset with a of goods sold – or COGS, taxes, depreciation and useful life that extends beyond the tax year. interest). Also known as: Capital Expense Accounting treatment: Cannot be fully deducted in the period when they were incurred. Operating expenses are fully deducted in the Tangible assets are depreciated and intangible assets are amortized accounting period during which they were over time. incurred. In throughput accounting: Money spent on inventory falls under CAPEX. The money spent turning inventory into throughput is OPEX. In real estate term: Costs incurred for buying the income producing property. Costs associated with the operation and maintenance of an income producing property. Examples: Buying machinery and other equipment, acquiring intellectual property assets like patents, furniture and fixtures Wages, maintenance and repair of machinery, utilities, rent, SG&A expenses, license fees, office running expenses Operating Expenditure, Revenue Expenditure http://www.office365-singapore.com/microsoft-office-365/office-365-opex-cost-savings/
  • 17. Things to think about  Content Migration  Connectivity    Internet Connectivity Cloud connectivity to on-premises LOB applications Features   Do you need features your chosen cloud doesn't have / support? Customisations  Developing  Deploying  Maintenance / Support - Third Party Support Contracts (changes to the platform might break your code)
  • 18. Job Security – The end of the IT Pro?

Editor's Notes

  1. NIST – National Institute for Standards and TechnologyOn-demand self-service. A consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service provider. Broad network access. Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, tablets, laptops, and workstations).Resource pooling. The provider’s computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. There is a sense of location independence in that the customer generally has no control or knowledge over the exact location of the provided resources but may be able to specify location at a higher level of abstraction (e.g., country, state, or datacenter). Examples of resources include storage, processing, memory, and network bandwidth.Rapid elasticity. Capabilities can be elastically provisioned and released, in some cases automatically, to scale rapidly outward and inward commensurate with demand. To the consumer, the capabilities available for provisioning often appear to be unlimited and can be appropriated in any quantity at any time.Measured service. Cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts). Resource usage can be monitored, controlled, and reported, providing transparency for both the provider and consumer of the utilized service.SaaS – Software-as-a-Service is a model of software deployment whereby a provider licenses an application to customers for use as a service on demand. One example of SaaS is the Salesforce.com CRM application.IaaS – Infrastructure-as-a-Service is the delivery of computer infrastructure (typically a platform virtualization environment) as a service. Rather than purchasing servers, software, data center space or network equipment, clients instead buy those resources as a fully outsourced service. One such example of this is the Amazon web services.PaaS – Platform-as a-Service is the delivery of a computing platform and solution stack as a service. It facilitates the deployment of applications without the cost and complexity of buying and managing the underlying hardware and software layers. PaaS provides the facilities required to support the complete lifecycle of building and delivering web applications and services. An example of this would the GoogleApps.DaaS – Desktop-as-a-Service enables users to use their desktops virtually from anywhere. Commonly known as “Desktop Virtualization”, this concept separates personal computer desktop environments from the physical machine through a client-server computing model. Nowadays, with the rise of SaaS and RIA (Rich Internet Applications) this method of usage is becoming obsolete.
  2. IT service continuity is a subset of business continuity planning and encompasses IT disaster recovery planning and wider IT resilience planning. It is the process of assessing and managing risks associated with information technology (IT) departments. It involves the evaluation of values, threats, risks, vulnerabilities and development of countermeasures to ensure continuation in the event of an IT services disruption.
  3. European Economic Area:- Member states of the EU, except Croatia, who is expected to join later, plus Iceland, Lichtenstein and Norway